Analysis
-
max time kernel
102s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
05-02-2025 10:23
Behavioral task
behavioral1
Sample
2560-3-0x00000000012B0000-0x000000000194D000-memory.exe
Resource
win7-20240729-en
0 signatures
150 seconds
General
-
Target
2560-3-0x00000000012B0000-0x000000000194D000-memory.exe
-
Size
6.6MB
-
MD5
86c72a870587ef779c9ffb5c770121e7
-
SHA1
60ab5321b297c7cc9aee6694d368e3f085704d70
-
SHA256
f318e2e801070964029bd97961649134d3b4963cc6d59bf65337c02f405a9075
-
SHA512
97598f0b6f382e815d016b82882e3d14415958e0d542a42c9d17d39b91872a45ed6493809fbb96a1986a9c11dbbeb8adf48153fb19a7e24b0ffa1bc0093410e6
-
SSDEEP
98304:kHfiMAonqrstotbDgJAfVFXECbehmESXw2Fz4Zjqj:BQNJiHEC6hmEn2FEoj
Malware Config
Signatures
-
Stealc family
-
Program crash 1 IoCs
pid pid_target Process procid_target 2068 1060 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2560-3-0x00000000012B0000-0x000000000194D000-memory.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2560-3-0x00000000012B0000-0x000000000194D000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2560-3-0x00000000012B0000-0x000000000194D000-memory.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1060 -s 2162⤵
- Program crash
PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1060 -ip 10601⤵PID:3512